Big picture

This is about #11162.

External resources about personas

Data sources

Collective brainstorming in August 2016

Use cases:

  • A small group of English-speaking journalists use Tails to analyze an archive of leaked documents and prepare articles about them.

  • A well-established music teacher uses Tails to bypass the software and network limitations on his professional laptop.

  • Someone living in a controlled housing uses Tails to avoid having all his Internet browsing monitored by the staff.

  • A political scientist in Egypt uses Tails to send his findings to Germany while avoiding State surveillance.

  • A woman who lives with someone abusing her uses Tails to communicate stealthily and without living traces on the home computer.

  • A political activist uses Tails to coordinate with their affinity group and organize a demonstration.

  • A person suffering from cancer uses Tails to learn about their disease while avoiding their employer learning about their condition.

  • A group of people preparing a plea for defending activists in court uses Tails to prepare the plea and store the documents in a safe place.

  • A free software contributor uses Tails to translate the security tools used by their community into Bahasa Indonesia.

  • A whistle-blower uses Tails to store and edit to-be-leaked documents securely.

  • A lawyer uses Tails to communicate with their client in a secure and anonymous fashion.

  • A Tails developer uses Tails to develop Tails and understand better the struggling of users.

  • A university student uses Tails to publish publicly-funded but copyrighted scientific papers online.

  • Union workers use Tails to coordinate about labor struggle over their company's network.

  • A Russian tourist uses Tails to access their online bank account without getting their credential stolen.

  • A nomadic person with no personal laptop uses Tails to carry the same computing environment and personal documents around.

  • A abuse contact uses Tails in order to communicate with survivors contacting them.

  • A person without their own Internet access uses Tails to use an uncensored Internet.

  • A teenager uses Tails to escape parental control filter.

  • A group of people use Tails to write a book together and publish it.

  • A scientist uses Tails to report and transcribe interviews while preserving the personal identifying information of the interviewees.

  • Webmasters of a cop-watching website use Tails to reduce their chance of being caught while reporting on police violence.

  • A photographer uses Tails to store and work on pictures before publication.

  • A person without the need for a big storage uses Tails as their main operating system to have more privacy.

Collective process from August 2017

Summary of a 2 hours session we did with 12 core contributors.

This process is inspired by the workshop described in The Essential Persona Lifecycle by Tamara Adlin and John Pruitt, Chapter 4 Persona conception and gestation.

  • General explanation of what personas are and why they are useful (15')

  • Everybody prepares, in silent, sticky notes describing a user and their goal. (15')

    For example:

    • "Women that go through domestic violence and wants to escape from that."
    • "Webmasters of a sensitive website that wants to hack on it."
  • All together we assimilate these sticky notes and the ones identified in August 2016 by types of users. (30')

    We start with predefined categories based on last year's output and adding new ones or splitting existing ones as needed. There should be no more than 10 stick notes per category.

    • Predefined categories:

      • Activist
      • Censorship evader
      • Contributor
      • Darknet customer
      • Information freedom fighter
      • Nomadic
      • Privacy geek
      • Surveilled at home
    • Final categories:

      • Activist
      • Censorship evader
      • Contributor
      • Darknet customer
      • Evil people
      • Information freedom fighter
      • Journalist or researcher
      • Law enforcement
      • Nomadic
      • People helping others in shit
      • People we don't want to help
      • Privacy geek
      • Sensitive content creator
      • Surveilled at home
      • Surveilled at work
  • The facilitator takes pictures of the resulting assimilation and removes the user categories.

  • All together we assimilate again the same stick notes and group them by user goals (45').

    User goals are short sentences starting with "I want..." or "I need...". There should be no more than 10 stick notes per category. Sticky notes that fit in more than one goal can be duplicated.

  • All together we summarize these goals by identifying main goals and subgoals. (10')

    • Final goals:

      1. I want to hide personally identifying information or sensitive information about myself
      2. I want to keep content & information secret from my government
      3. I want to keep information secret from my family and close people
      4. I want to access sensitive information stealthily
      5. I want to hide my identity
      6. I want to hide my location and identity
      7. I want to hide my location
      8. I don't want to raise suspicion

      9. I want to communicate and collaborate securely

      10. I want to communicate securely with known peers
      11. I want to communicate securely with unknown peers
      12. I want to communicate with others who are under surveillance
      13. We want to share and work on documents privately

      14. I want to store information safely

      15. I need to safely store my data
      16. I want to edit or anonymize my data

      17. I want to leave no trace on the computer

      18. I need to use a computer that is not mine

      19. I want information to be free

      20. I want to access censored information online
      21. I want to publish sensitive information

      22. I want to avoid corporate & governmental information gathering on my data

      23. I want to understand people using Tails
      24. I just want more privacy

Skeletons

After this collective session, the core team working on the personas (3 people) started preparing skeletons, rough descriptions of each persona, based on the main goals identified earlier. Each persona is primarily focused on a single main goal but also corresponds to some subgoals of other categories.

On top of demographics, background, and technical skills information, our framework includes holistic security and threat modeling information (based on the Personas Framework for Internet Freedom developed by SecondMuse):

  1. Name (genderneutral)
  2. Occupation
  3. Background
  4. Motivations
  5. Challenges and threats
  6. Communications
  7. Goals
  8. Use cases
  9. Definition of security
  10. . Key Technologies used regularly
    1. Features used in Tails
    2. Features used outside of Tails
  11. . Threat perception
  12. . Security precautions

Kim

  • Occupation

  • Background

    • Kim is a gay youth from Nigeria that has been institutionalized.
    • Kim has been abused at home.
    • Kim is using a shared a computer.
  • Motivations

    • Kim is searching for help and support groups online and also tries to find solidarity.
    • Kim wants to feel normal.
    • Kim wants to avoid surveillance from mentors in the institution they lives in.
    • Kim does not want to leave traces on the shared computer and prefers to hide their identity by accessing information stealthily.
  • Challenges and threats:

    • The computer room is crowded
    • Can't meet with support groups openly and has to do it online
    • Surveillance from mentors
    • Time is limited
    • Fear of previous abusers
    • Worried about saving information safely
    • Needs to know keyboard shortcuts for switching applications in case somebody walks behind them
    • Needs safe storage for email addresses and nicknames
    • Needs access to books online
    • Needs to use a pseudonym
    • Needs a stealth or dedicated email address
    • Needs to store data in the cloud or an encrypted device in case Kim gets searched
  • Communications

    • Support groups online: forums, websites
    • Known peers: chat, email
    • Unknown peers: chat, email, forums
    • Psychologist online: forums, websites
  • Goals

    1. I want to hide personally identifying information or sensitive information about myself
    2. I want to keep content & information secret from my government
    3. I want to keep information secret from my family and close people
    4. I want to access sensitive information stealthily
    5. I want to hide my identity
    6. I want to hide my location and identity
    7. I want to hide my location
    8. I don't want to raise suspicion

    9. I want to communicate and collaborate securely

    10. I want to communicate securely with known peers
    11. I want to communicate securely with unknown peers

    12. I want to leave no trace on the computer

    13. I need to use a computer that is not mine

    14. I want information to be free

    15. I want to access censored information online
  • Use cases

  • Definition of security

  • Key technologies used regularly

    1. Features used in Tails

    2. Features used outside of Tails

  • Threat perception

  • Security precautions

Alex

  • Occupation

    • Alex is an investigative journalist doing high stake reporting on the government, and in particular some members of the government who are involved in corruption, drug and human trafficking.
  • Background

    • Alex lives in Mexico and reports on the mafia and drug related corruption of politicians.
    • Alex is visiting the country to interview locals and needs to get out of the country with the collected information and media safely.
    • Alex needs to communicate with journalistic partners and sources and to protect these communications as well as the identity of Alex' interview partners.
    • Alex needs to store and edit the collected information safely. They also need to keep metadata in order to prove the evidence. Furthermore they also need to send big videos files over the Internet for somebody else to edit it.
  • Motivations

    • Publish information about corrupted politicians and harm they did.
    • Turn public opinion against these people.
  • Challenges

    • Access information
    • Publish under pseudonyms
    • Hide their location and identity
    • Stealth research by visiting journalists
    • Bring information outside of the country
  • Communications

  • Goals

    1. I want to hide personally identifying information or sensitive information about myself
    2. I want to keep content & information secret from my government
    3. I want to access sensitive information stealthily
    4. I want to hide my identity
    5. I don't want to raise suspicion

    6. I want to communicate and collaborate securely

    7. I want to communicate securely with known peers
    8. I want to communicate securely with unknown peers
    9. I want to communicate with others who are under surveillance
    10. We want to share and work on documents privately

    11. I want to store information safely

    12. I need to safely store my data
    13. I want to edit or anonymize my data

    14. I want information to be free

    15. I want to publish sensitive information
  • Use cases

  • Definition of security

  • Key technologies used regularly

    1. Features used in Tails

    2. Features used outside of Tails

  • Threat perception

  • Security precautions

Riou

  • Occupation

    Riou is a student in Hong Kong, who participates in the Umbrella movement.

  • Background

    • Riou organizes a public massive protest against new government policies and laws. The organizers need to be stealthy and anonymous, but the protest needs to be public and advertised. The organizers need to send out strategic information to the press and to the public so that citizens actually know where to show up. In order to publish this information they use websites which are not in the country, so that the government cannot censor this information.

    • During the protest they leave their phones at home. They are doing most of their communication beforehand. Although they take photos and videos of the protests and try to publish this information on websites which are censored within the country. They got to get it online as soon as it's produced on social media and they also want to stream the protest and speeches. They might want to do that on devices that are not theirs, so that they can hide their involvement in the organization of this protest.

  • Motivations

  • Challenges

    • Use networks
    • Access information online
    • Use applications that the government is not monitoring
    • Use mesh applications
  • Communications

    • Local group chat
    • Encrypted emails
  • Goals

    1. I want to hide personally identifying information or sensitive information about myself
    2. I want to keep content & information secret from my government
    3. I want to hide my identity
    4. I want to hide my location
    5. I don't want to raise suspicion

    6. I want to communicate and collaborate securely

    7. I want to communicate securely with known peers

    8. I want information to be free

    9. I want to access censored information online
    10. I want to publish sensitive information
  • Use cases

  • Definition of security

  • Key technologies used regularly

    1. Features used in Tails

    2. Features used outside of Tails

  • Threat perception

  • Security precautions

Next steps

  1. Create tickets for the following steps #14525
  2. Draft "Privacy geek" skeleton
  3. Check back yellow post-it notes
  4. Refine good enough draft skeletons
  5. Link to actual stories or research if we have it
  6. Ask for comments on tails-project@boum.org
  7. Ask the project to prioritize the 4 skeletons according to different dimensions
  8. Write 1st version of foundation document:
  9. Find images (photos or drawings) for the personas
  10. Consider using 2 images per persona so that we have a genderneutral persona
  11. Reference data
  12. Prepare summary for developers:
  13. Two A4 pages per persona?
  14. Have a detailed version and a condensed version?